Reference no: EM132736390
Project Part 2: Network Design
Introduction
As discussed so far in this course, the configuration of a network affects the options available for security and network defense. Using the network survey produced during the first part of this project, together with host vulnerability assessments and access requirements, you need to design an updated network structure.
Scenario
You have been working as a technology associate the information systems department at Corporation Techs for a while now. You have discovered so far that all of Corporation Techs' computer systems share the same Class C public IP address range, including workstations along with servers providing authentication, e-mail, and both secure and public Web sites.
Your next task in this project is to construct a basic network design. An important requirement for the network design is to reduce the number of public addresses needed as the subnet lease results in very high ISP costs.
Tasks
Construct a basic network design, separating private and public services within the Corporation Techs' network. To do so, you must:
1. Access the PCAP files using NetWitness Investigator, and browse the Nmap scan (XML format), topology fisheye chart (PDF format), and Nessus report (HTML format).
2. Identify vulnerabilities and clear-text information transfer.
3. Conduct research and determine the best network design to ensure security of internal access while retaining public Web site availability.
4. Identify any opportunities for reduced ISP costs through port redirection or address translation.
5. Design a network configuration, identifying network gateways, port or address redirection systems, and the location of hosts within private and protected network segments.
6. Create a professional report detailing the information above as supportive documentation for the network security plan.
7. Create a report that includes a basic network diagram and research results.
How economies of scale and economies of scope
: Briefly explain how economies of scale and economies of scope would be of use to motor vehicle manufacturing companies like Chrystler.
|
Reaction of the big three producers
: From the 1970s onwards, the US automobile industry, so long dominant in its ability to outcompete the automobile industries of other countries, came under threa
|
Fundamental fairness and equal protection
: Explain the principles found in the 14th Amendment, such as due process, fundamental fairness, and equal protection.
|
Find the number of runs per year
: The Friendly Sausage Factory (FSF) can produce hot dogs at a rate of 5,000 per day. FSF supplies hot dogs to local restaurants at a steady rate of 230 per day.
|
Identify vulnerabilities and clear-text information transfer
: Identify vulnerabilities and clear-text information transfer. Create a report that includes a basic network diagram and research results.
|
Determine the optimal order quantity
: A mail-order house uses 16,920 boxes a year. Carrying costs are 60 cents per box a year, and ordering costs are $96. The following price schedule applies.
|
Determine the order quantities for cycles
: A drugstore uses fixed-order cycles for many of the items it stocks. The manager wants a service level of .98. The order interval is 11 days, and lead time
|
Determine upper and lower control limits
: The machine's output is approximately normal with a mean of .95 liter and a standard deviation of .04 liter. Output is monitored using means of samples
|
Compute the capability index for the process
: Compute the capability index (Cp) for the process. (Round your intermediate calculations to 3 decimal places and final answer to 2 decimal places.)
|